Conversation
|
Hi @Helion55. Thanks for your PR. I'm waiting for a netobserv member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
This helm chart contains
for the Issue #1000 |
jotak
left a comment
There was a problem hiding this comment.
Thanks a lot @Helion55 !
I've found a couple of issues while trying, posting here suggestions.
There's still an issue related to the certificate that I'm looking into. A certificate is needed for the operator webhooks, and we rely on cert-manager to generate them. Need to figure out how to do that with helm. Basically, it is expected that a certificate is generated in a Secret named webhook-server-cert.
| apiVersion: apps/v1 | ||
| kind: Deployment | ||
| metadata: | ||
| name: wnetobserv-controller-manager |
There was a problem hiding this comment.
typo here
| name: wnetobserv-controller-manager | |
| name: netobserv-controller-manager |
There was a problem hiding this comment.
I think in your last commit you reverted some of the changes that you did, I guess inadvertently
Hello @jotak Thanks for the suggestions. I have committed them. I am also starting to find any solutions regarding that certificate stuff, I have recently worked with cert manager; I hope to get help from that. |
| clientConfig: | ||
| service: | ||
| name: netobserv-webhook-service | ||
| namespace: netobserv |
There was a problem hiding this comment.
We surely want the namespace to be configurable:
| namespace: netobserv | |
| namespace: {{ .Release.Namespace }} |
| clientConfig: | ||
| service: | ||
| name: netobserv-webhook-service | ||
| namespace: netobserv |
There was a problem hiding this comment.
Same here:
| namespace: netobserv | |
| namespace: {{ .Release.Namespace }} |
|
I'm installing latest cert-manager on kind, and use this certificate config: # The following manifests contain a self-signed issuer CR and a certificate CR.
# More document can be found at https://docs.cert-manager.io
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: selfsigned-issuer
spec:
selfSigned: {}
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: serving-cert
spec:
dnsNames:
- netobserv-webhook-service.{{ .Release.Namespace }}.svc
- netobserv-webhook-service.{{ .Release.Namespace }}.svc.cluster.local
issuerRef:
kind: Issuer
name: selfsigned-issuer
secretName: webhook-server-certWhich generates the intended certificate, and the oeprator pod now starts correctly. ... so we're not done yet |
Co-authored-by: Joel Takvorian <joel.takvorian@homeblocks.net>
Co-authored-by: Joel Takvorian <joel.takvorian@homeblocks.net>
Co-authored-by: Joel Takvorian <joel.takvorian@homeblocks.net>
Co-authored-by: Joel Takvorian <joel.takvorian@homeblocks.net>
Co-authored-by: Joel Takvorian <joel.takvorian@homeblocks.net>
Co-authored-by: Joel Takvorian <joel.takvorian@homeblocks.net>
Co-authored-by: Joel Takvorian <joel.takvorian@homeblocks.net>
Co-authored-by: Joel Takvorian <joel.takvorian@homeblocks.net>
|
Hi @Helion55 , |
|
I think it can be merged as a first iteration, or let me know if there's more you plan to add. Later we'll want to have the chart automatically generated from the make targets, similar to what we have today with the OLM bundle. And then we can think about pushing that to ArtifactHub. So let me know if you're interested :-) |
|
Yes, it sounds good. Just one thing: can we go with the Let's Encrypt issuer rather than self-signed certificates? Please check this once. apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: cert-issuer
spec:
acme:
server: https://acme-v02.api.letsencrypt.org/directory
email: <YOUR-MAIL@MAIL.COM>
privateKeySecretRef:
name: private-key-cert
solvers:
- http01:
ingress:
class: nginx |
I guess that's the kind of things that make sense to customize in the helm values? So user can choose between self-signed or let's encrypt, and in case of the latter, they have to provide an email and key secret ref? |
|
@Helion55 on second thought, I don't think it's the role of netobserv to create a real ClusterIssuer on the server. Instead we could go that way:
|
|
/lgtm |
|
@Helion55: The following test failed, say
Full PR test history. Your PR dashboard. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
Yes, this will be much more convenient. Can you merge this for now? After that, we can improve this as required in the future. |
|
/approve |
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jotak The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Description
Helm chart to install Network Observability Operator
Fixes #1000
Upstream-only feature
Dependencies
n/a